Vai al contenuto principale della pagina
| Autore: |
Lenzini Gabriele
|
| Titolo: |
Information Systems Security and Privacy : 9th International Conference, ICISSP 2023, Lisbon, Portugal, 22–24 February, 2023, and 10th International Conference, ICISSP 2024, Rome, Italy, February 26–28, 2024, Revised Selected Papers / / edited by Gabriele Lenzini, Paolo Mori, Steven Furnell
|
| Pubblicazione: | Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2026 |
| Edizione: | 1st ed. 2026. |
| Descrizione fisica: | 1 online resource (500 pages) |
| Disciplina: | 005.8 |
| Soggetto topico: | Data protection |
| Computer networks | |
| Computer systems | |
| Image processing - Digital techniques | |
| Computer vision | |
| Artificial intelligence | |
| Data and Information Security | |
| Computer Communication Networks | |
| Computer System Implementation | |
| Computer Imaging, Vision, Pattern Recognition and Graphics | |
| Artificial Intelligence | |
| Altri autori: |
MoriPaolo
FurnellSteven
|
| Nota di contenuto: | Management and Operations -- On the Centrality of Web Trackers: Assessing Its Potential for Automated Detection -- Secure Multi-Party Querying Federated Graph Databases -- Employing Board Cyber-Risk Management Collaborative Game Under Condition of Uncertainty -- Applications and Services -- Safeguarding Data from Deprecated System Software: A Resilient Boot Architecture for Edge Devices Leveraging TEEs -- Evaluating Input Transformation Ensembles Against Adversarial Attacks -- An Improved Attention-Enhanced LSTM Model for Early Detection of Distributed Denial of Service Attacks -- Seeing is Believing: Assessing and Enhancing Android Privacy Indicators through Eye-Tracking Analysis.-Technologies and Foundations -- Data Exfiltration from Network-Isolated Virtual Computing Systems with Infrastructure Mediated Power Analysis -- Chosen Text Attacks Against an Image Encryption Based on the Kronecker Xor Product, the Hill Cipher and the Sigmoid Logistic Map -- Efficient Management Models for SGX Enclaves -- Forgery Resistance of Behavioral Authentication Through Score Fusion Methods -- mKEM-DEM Based Anonymous Certificateless Hybrid Signcryption for Broadcast VANET Communication -- Assessing the Efficiency of Polynomial Commitment Schemes in Erasure Code-Based Data Distribution -- Feasibility Study on EM-FI Effectiveness Using Physical Layer Abstraction -- A Peek into the Ecosystem of TPM v2. |
| Sommario/riassunto: | This book constitutes the refereed post-proceedings of the 9th and 10th International Conference on Information Systems Security and Privacy, ICISSP 2023 and 2024, held in Lisbon, Portugal, and in Rome, Italy during February 22-24, 2023 and February 26-28, 2024, respectively. The 15 full papers included in this book were carefully reviewed and selected from 285 submissions. These papers have been organized under the following topical sections: Management and operations; Applications and services; and Technologies and foundations. |
| Titolo autorizzato: | Information Systems Security and Privacy ![]() |
| ISBN: | 3-031-89518-5 |
| Formato: | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione: | Inglese |
| Record Nr.: | 9911046534703321 |
| Lo trovi qui: | Univ. Federico II |
| Opac: | Controlla la disponibilità qui |